2015
DOI: 10.1007/s11432-015-5409-4
|View full text |Cite
|
Sign up to set email alerts
|

Cryptanalysis of Prime Power RSA with two private exponents

Abstract: In this paper, we consider a variant of RSA schemes called Prime Power RSA with modulus N = p r q for r 2, where p, q are of the same bit-size. May showed that when private exponent, N can be factored in polynomial time in PKC 2004. Later in 2014, Sarkar improved the bound for r 5. We propose a new cryptanalytic method to attack this RSA variant when given two pairs of public and private exponents, namely (e 1 , d 1 ) and (e 2 , d 2 ) with the same modulus N . Suppose that we know d 1 < N δ 1 and d 2 < N δ 2 .… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
6
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(6 citation statements)
references
References 21 publications
0
6
0
Order By: Relevance
“…. Also, we assume σ 1 = σ 2 = σ 3 = σ in order to compare our results with the theoretical results of [1], [2], [3], [4] and [5], our work show that for 5 ≤ r ≤ 10 we obtain better bounds. The rest of the paper is organised as follows.…”
Section: Introductionmentioning
confidence: 62%
See 3 more Smart Citations
“…. Also, we assume σ 1 = σ 2 = σ 3 = σ in order to compare our results with the theoretical results of [1], [2], [3], [4] and [5], our work show that for 5 ≤ r ≤ 10 we obtain better bounds. The rest of the paper is organised as follows.…”
Section: Introductionmentioning
confidence: 62%
“…In order to make comparison with other bounds, we assume σ 1 = σ 2 = σ 3 = σ as shown in Table 3 From Table 3.2, one can observe that, our bound is better than [2], [4] and [5] for r ≥ 2 and also better than all the compared bounds for 5 ≤ r ≤ 10.…”
Section: Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…These applications as well as its own nice property have made it a hot topic ever since its first introduction. Moreover, there are many analyses and attacks on this scheme, see [17][18][19][20][21][22][23][24].…”
Section: Introductionmentioning
confidence: 99%